Submission Summary:

What's been foundSeverity Level
Produces outbound traffic.


Technical Details:


File System Modifications

#Filename(s)File SizeFile HashAlias
1 %AppData%\Svchost\Svchost.exe
[file and pathname of the sample #1]
17,408 bytes MD5: 0x75E10BF5922B1F80BF5AF2F432608927
SHA-1: 0xEB12C58A5CF48BCB08CAD2385AB877CDB5C13EC1
Mal/Behav-031 [Sophos]
Backdoor.Win32.Inject [Ikarus]
packed with UPX [Kaspersky Lab]
2 %Programs%\Startup\Svchost.exe.lnk 895 bytes MD5: 0xAF38D851B6241065AE1AE7FF59EE1E10
SHA-1: 0xC8F23F201BFD9D66CC3ADBF7F5B5D20999712637
(not available)


Memory Modifications

Process NameProcess FilenameMain Module Size
[filename of the sample #1][file and pathname of the sample #1]57,344 bytes


Other details

Remote HostPort Number


Outbound traffic (potentially malicious)



All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2018 ThreatExpert. All rights reserved.